Author: psm-admin

Are You Listening? Are They? The rise in virtual assistants like Amazon’s Alexa, Apple’s Siri, Google’s Assistant and Microsoft’s Cortana have led to many concerns about user privacy and security. Whether we have a standalone device like the Echo sitting

Recovering from Identity theft! Sometime ago we published the article “If You’ve Been Hacked” to provide information on how to recover if your computer has been compromised. While that focused more on the initial stages of a hack, there are

The Medieval Chicken Farmer and You! You’ve heard the old saying about not putting all your eggs in one basket? Undoubtedly, the phrase was first coined in the middle ages by a frustrated – and soon to be hungry –

Passwords Management Passwords, passwords, passwords! If you are concerned about the security of your online information and personal identity (and who wouldn’t be?), then you’ve had to think about passwords. Security people talk about them. Every website you create an

Online Bank Security Remember those old movies where the bank robber needed to “crack” the safe? In my mind’s eye he’s crouched in front of a big metal cube, holding something like a stethoscope up to the door as he

Unlocking the Green Padlock So you’re doing some online banking – or shopping or logging into your health insurance or HSA account, etc. – and you suddenly remember all those terrible stories about fake websites luring unsuspecting customers into giving

Keeping Online Shopping Safe – Things You Might Not Think Of The holiday season often brings out news reports and articles highlighting the increased use of the internet for Christmas shopping and how many billions of dollars will be spent

Geolocation Where are you, right now? Of course, you know the answer to this question (I assume!), but how many other people are privy to your exact location? Family? Close friends? Acquaintances? Strangers? Your phone? Yes, your phone. Geolocation –

You’re cautious. You use long, complicated passwords. You never click on links from sources you are unfamiliar with. You never respond to suspicious emails. You don’t reuse passwords and even use 2-factor authentication for your online accounts when it’s available.